Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin

Tämä on pro gradu -tutkielma aiheesta ”kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin”. Tämä tutkimus pyrkii selvittämään kuluttajien suhtautumista mobiililaitteidensa tietoturvakysymyksiin – etenkin siihen, miksi kuluttajat eivät käytä tietoturvasovelluksia mobiililaitteillaan. Tässä...

Full description

Bibliographic Details
Main Authors: Kannisto, Leo, Mattila, Petri
Other Authors: Faculty of Information Technology, Informaatioteknologian tiedekunta, Informaatioteknologia, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:fin
Published: 2017
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/55967
_version_ 1828193101644038144
author Kannisto, Leo Mattila, Petri
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_facet Kannisto, Leo Mattila, Petri Faculty of Information Technology Informaatioteknologian tiedekunta Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto Kannisto, Leo Mattila, Petri Faculty of Information Technology Informaatioteknologian tiedekunta Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto
author_sort Kannisto, Leo
datasource_str_mv jyx
description Tämä on pro gradu -tutkielma aiheesta ”kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin”. Tämä tutkimus pyrkii selvittämään kuluttajien suhtautumista mobiililaitteidensa tietoturvakysymyksiin – etenkin siihen, miksi kuluttajat eivät käytä tietoturvasovelluksia mobiililaitteillaan. Tässä tutkielmassa mobiililaitteista tarkastellaan älypuhelimia ja tabletteja. Tutkielman kirjallisuuskatsausosio esittelee tutkimuksen keskeiset aiheet: tietoturvan ja tietoturvauhkat mobiililaitekontekstissa sekä Rogersin (1975, 1983) suojelumotivaatioteorian, jonka ohella esitellään suojelumotivaatioteoriaa hyödyntäneitä aiempia tietoturva-aiheisia tutkimuksia. Teimme kvalitatiivisen tutkimuksen haastattelemalla suomalaisia mobiililaitteiden kuluttajakäyttäjiä heidän tietoturvakäyttäytymisestään. Tutkimuksen tuloksena selvisi, että tietoturvasovellusten käyttöön ja käyttöaikeisiin sekä käyttämättömyyteen voidaan nähdä vaikuttavan suuri osa suojelumotivaatioteorian käsitteistä. Erityisesti tietoturvasovellusten käyttämättömyyttä selittävät käsitteet koettu haavoittuvuus uhkalle sekä vastareaktion kustannukset. Consumers' attitudes concerning mobile device data security threats. This is a master’s thesis on consumer attitudes towards mobile device data security threats. The purpose of this thesis is to examine why consumers do not use data security applications on their mobile devices – specifically smartphones and tablets in the thesis’ context. The literature review covers the topics of data security and data security threats and protection motivation theory (PMT) by Rogers (1975, 1983), and the use of PMT in other earlier studies regarding data security. We conducted a qualitative study by interviewing Finnish mobile device consumers and their data security behaviour. As a result, we found that the use of, the intentions to use and to not use data security applications is affected by most of the constructs of PMT. Vulnerability and response costs are the core constructs for not using data security applications on mobile devices.
first_indexed 2023-03-22T09:58:17Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kannisto, Leo", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Mattila, Petri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-11-21T15:08:46Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-11-21T15:08:46Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1802824", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/55967", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 on pro gradu -tutkielma aiheesta \u201dkuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin\u201d. T\u00e4m\u00e4 tutkimus pyrkii selvitt\u00e4m\u00e4\u00e4n kuluttajien suhtautumista mobiililaitteidensa tietoturvakysymyksiin \u2013 etenkin siihen, miksi kuluttajat eiv\u00e4t k\u00e4yt\u00e4 tietoturvasovelluksia mobiililaitteillaan. T\u00e4ss\u00e4 tutkielmassa mobiililaitteista tarkastellaan \u00e4lypuhelimia ja tabletteja. Tutkielman kirjallisuuskatsausosio esittelee tutkimuksen keskeiset aiheet: tietoturvan ja tietoturvauhkat mobiililaitekontekstissa sek\u00e4 Rogersin (1975, 1983) suojelumotivaatioteorian, jonka ohella esitell\u00e4\u00e4n suojelumotivaatioteoriaa hy\u00f6dynt\u00e4neit\u00e4 aiempia tietoturva-aiheisia tutkimuksia. Teimme kvalitatiivisen tutkimuksen haastattelemalla suomalaisia mobiililaitteiden kuluttajak\u00e4ytt\u00e4ji\u00e4 heid\u00e4n tietoturvak\u00e4ytt\u00e4ytymisest\u00e4\u00e4n. Tutkimuksen tuloksena selvisi, ett\u00e4 tietoturvasovellusten k\u00e4ytt\u00f6\u00f6n ja k\u00e4ytt\u00f6aikeisiin sek\u00e4 k\u00e4ytt\u00e4m\u00e4tt\u00f6myyteen voidaan n\u00e4hd\u00e4 vaikuttavan suuri osa suojelumotivaatioteorian k\u00e4sitteist\u00e4. Erityisesti tietoturvasovellusten k\u00e4ytt\u00e4m\u00e4tt\u00f6myytt\u00e4 selitt\u00e4v\u00e4t k\u00e4sitteet koettu haavoittuvuus uhkalle sek\u00e4 vastareaktion kustannukset.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Consumers' attitudes concerning mobile device data security threats.\r\n\r\nThis is a master\u2019s thesis on consumer attitudes towards mobile device data security threats. The purpose of this thesis is to examine why consumers do not use data security applications on their mobile devices \u2013 specifically smartphones and tablets in the thesis\u2019 context. The literature review covers the topics of data security and data security threats and protection motivation theory (PMT) by Rogers (1975, 1983), and the use of PMT in other earlier studies regarding data security. We conducted a qualitative study by interviewing Finnish mobile device consumers and their data security behaviour. As a result, we found that the use of, the intentions to use and to not use data security applications is affected by most of the constructs of PMT. Vulnerability and response costs are the core constructs for not using data security applications on mobile devices.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Leo Kannisto (leolkann) on 2017-11-21 15:08:45.962307. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-11-21T15:08:46Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711214324.pdf: 932154 bytes, checksum: 581052bae073222dca4a5470434b6c0b (MD5)\r\nlicense.html: 1151 bytes, checksum: 66012aae308cec0bf556d14ea4785372 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-11-21T15:08:46Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711214324.pdf: 932154 bytes, checksum: 581052bae073222dca4a5470434b6c0b (MD5)\r\nlicense.html: 1151 bytes, checksum: 66012aae308cec0bf556d14ea4785372 (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (95 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "suojelumotivaatioteoria", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "mobile data security", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "data security threat", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "smartphone", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "protection motivation theory", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201711214324", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Kvalitatiivinen tutkimus", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-11-21T15:08:46Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiililaitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lypuhelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "taulutietokoneet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kuluttajat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "asenteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_55967
language fin
last_indexed 2025-03-31T20:01:34Z
main_date 2017-01-01T00:00:00Z
main_date_str 2017
publishDate 2017
record_format qdc
source_str_mv jyx
spellingShingle Kannisto, Leo Mattila, Petri Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin suojelumotivaatioteoria mobile data security data security threat smartphone protection motivation theory Information Systems Science Tietojärjestelmätiede Kvalitatiivinen tutkimus 601 tietoturva uhat mobiililaitteet älypuhelimet taulutietokoneet kuluttajat asenteet
title Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin
title_full Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin
title_fullStr Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin
title_full_unstemmed Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin
title_short Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin
title_sort kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin
title_txtP Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin
topic suojelumotivaatioteoria mobile data security data security threat smartphone protection motivation theory Information Systems Science Tietojärjestelmätiede Kvalitatiivinen tutkimus 601 tietoturva uhat mobiililaitteet älypuhelimet taulutietokoneet kuluttajat asenteet
topic_facet 601 Information Systems Science Kvalitatiivinen tutkimus Tietojärjestelmätiede asenteet data security threat kuluttajat mobiililaitteet mobile data security protection motivation theory smartphone suojelumotivaatioteoria taulutietokoneet tietoturva uhat älypuhelimet
url https://jyx.jyu.fi/handle/123456789/55967 http://www.urn.fi/URN:NBN:fi:jyu-201711214324
work_keys_str_mv AT kannistoleo kuluttajiensuhtautuminenmobiililaitteidentietoturvauhkiin